Logo
    Search

    Podcast Summary

    • Cyber attacks threatening advanced economiesCyber attacks from amateur criminals and nation-states can disrupt advanced economies, underscoring the need to balance technology's decentralized power with security without creating totalitarian societies.

      The world's most advanced economies, including the United States, are increasingly vulnerable to cyber attacks. A single stolen password or bug in software can cause significant disruption, as demonstrated by the Colonial Pipeline attack in 2021. Cybersecurity expert Nicole Perlroth, a guest on the "Your Undivided Attention" podcast, emphasizes that both amateur cybercriminals and nation-states possess the power to bring economies to their knees through cyber attacks. As technology continues to advance faster than our institutions, it's crucial to understand the implications of cyber weapons and the cyber arms race. The world must navigate the challenge of balancing the decentralized power of technology with the need for security without creating totalitarian societies. Nicole's journey into cybersecurity was sparked by a dinner in Miami, where she met industrial cybersecurity experts and discovered the importance of securing critical infrastructure against cyber threats.

    • The growing market for selling cyber vulnerabilities in critical infrastructure systemsThe market for buying and selling cyber vulnerabilities in critical infrastructure systems is a growing concern, with potential consequences ranging from sabotage and destruction to loss of life. The lack of transparency and discussion around this market compels some to write about it.

      The market for buying and selling cyber vulnerabilities in critical infrastructure systems is a growing concern, with potential consequences ranging from sabotage and destruction to loss of life. The speaker's encounter with Italian hackers who sold bugs to anyone, including those who could use them for nefarious purposes, highlighted the moral dilemma and the potential for unintended consequences. The language used to describe these issues, such as "bugs" and "cyber attacks," can obscure the true impact, which can include physical damage and even loss of life. The number of players in this market is increasing, making it harder for those trying to protect these systems, and the question of who is buying these vulnerabilities and for what purposes remains unanswered. The speaker was compelled to write a book on this topic due to the lack of transparency and discussion around this market.

    • Living in the Post-Stuxnet Era: Acknowledging the Reality of Buggy Software in Critical SystemsThe post-Stuxnet era highlights the risks of buggy software in critical systems, emphasizing the need for a nuanced conversation about the implications and potential consequences.

      We are currently living in the post-Stuxnet era, where the potential for cyberattacks using bugs in software has become a major concern for national security and critical infrastructure. The discussion highlights the importance of acknowledging this reality and questioning whether we should continue to produce buggy software for critical systems. Stuxnet, a cyber weapon developed by the NSA and Israel around 2006, demonstrated the potential for cyberattacks to cause significant damage, including the destruction of Iran's uranium supply and the infection of thousands of systems worldwide. Since then, governments and cybercriminal groups have invested in the development and acquisition of offensive cyberattack tools, making bugs in software a valuable asset. The concern is that when governments hold on to these bugs, they not only put their own operations at risk but also leave their citizens and critical infrastructure vulnerable. The discussion underscores the need for a more nuanced conversation about the implications of software eating the world and the potential risks associated with it.

    • Colonial Pipeline attack: A reminder of the asymmetric threat landscapeUnsecured passwords and lack of multifactor authentication can lead to major disruptions and economic risks through cyber attacks

      The Colonial Pipeline attack serves as a stark reminder of the asymmetric threat landscape in cybersecurity and the vulnerability of the US infrastructure. The attackers, who were not even sophisticated hackers, managed to rent ransomware and gained access to the pipeline company's IT systems through a stolen password and a forgotten employee account without multifactor authentication. This breach caused widespread panic and disruption, leading to gas shortages, grounded flights, and factory shutdowns, potentially putting the US economy at risk. The attack underscores the importance of securing passwords and enabling multifactor authentication, as well as the potential consequences of not doing so. The incident also highlights the potential for more severe attacks, such as those carried out by nation-states, which could have far-reaching impacts on economies and geopolitical situations.

    • The consequences of cyber attacks on critical infrastructure can be severeCyber attacks on critical infrastructure can disrupt power grids, media organizations, and economies, emphasizing the importance of prioritizing security in our digitized world.

      As our society rapidly digitizes, we are creating a larger attack surface area for cyber attacks, making our infrastructure more fragile and vulnerable. Cyber attacks, such as those on critical infrastructure like pipelines or nuclear plants, can have severe consequences, including economic and psychological impacts. The stakes are high, as seen in Ukraine where attacks have disrupted their power grid, media organizations, and even their economy. The trend of moving fast and breaking things, combined with a lack of incentives to prioritize security, has led to a growing number of vulnerabilities. The consequences of these attacks can be far-reaching and difficult to contain, making it crucial to consider the potential risks and take steps to mitigate them. The language we use to discuss cyber attacks can also impact our perception of their severity. By framing them in terms of the systems they affect, rather than just bugs in code, we can better understand the potential impact on our daily lives. Ultimately, it's essential to recognize the importance of security in our digitized world and take proactive measures to protect our critical infrastructure.

    • New vulnerabilities for national security in the digital worldRussia's use of stolen NSA exploit in a cyber attack on Ukraine caused significant damage and underscores the need for proactive and robust defense against increasingly sophisticated cyber threats, especially in the context of critical infrastructure operated by private companies.

      The digital world presents new vulnerabilities for national security, particularly in the context of critical infrastructure. The example of Russia using a stolen NSA zero-day exploit in a cyber attack on Ukraine, which paralyzed Merck's vaccine production lines, underscores this point. As the world becomes increasingly automated and reliant on technology, the potential harm from cyber attacks can be significant, even catastrophic. The Ukrainians warned that attacks on Western nations will be worse than what they have experienced, as they are still largely manual and analog, while the West is rapidly automating. Cyber attacks can cause damage that is difficult to quantify and can impact essential services and industries. With 80% of the critical infrastructure in the US now operated by private companies, there is a need for regulations to ensure these companies prioritize national security. The digital world requires a new kind of defense, one that is proactive and robust, to protect against the increasingly sophisticated threats.

    • Government's limited authority over private businesses leaves critical infrastructure vulnerableLack of adequate cybersecurity laws and regulations in place for private businesses puts critical infrastructure at risk, with slow progress towards effective legislation

      Despite the increasing threats of cyber attacks on critical infrastructure, there are still insufficient laws and regulations in place to ensure adequate cybersecurity measures. The failed attempt to pass a cybersecurity bill in 2012 and the reliance on toothless executive orders highlight the government's limited authority over private businesses. Recent developments, such as the breach disclosure law, are steps in the right direction, but there is still a long way to go. The medieval comparison underscores the slow pace at which laws can adapt to technological changes, leaving the nation state vulnerable to cyber attacks and the need for a more proactive approach.

    • The reliance on private companies for infrastructure creates a vulnerability suit leaving us open to cyber threatsStandardized security metrics and regulations are needed to ensure collective security against cyber threats

      As societies become more digitized, the reliance on private companies for infrastructure creates a vulnerability suit that leaves us open to cyber threats. Metaphors like a "vulnerability suit" or a "collective action problem" help illustrate the issue. The lack of standardized security metrics, such as a FICO score for cybersecurity, makes it difficult for organizations to assess risk when working with vendors or adopting open-source code. The incentives in the market can lead to chaos, with hackers selling zero-day exploits to the highest bidder, often outside of the US and Western countries. China, for example, has taken a more oppressive approach by restricting its hackers from attending hacking conferences and giving the state the right of first refusal on zero-day bugs. The US and the West are being outpriced in this market, and the hackers are not limited to operating within their borders. A solution could be the development and implementation of standardized security metrics and regulations to ensure collective security.

    • Countries like UAE and Saudi Arabia buying 0-day exploits for surveillanceIn the digital age, countries with significant financial resources can buy advanced cyber exploits, threatening surveillance and privacy of their own people and potential adversaries, while the US remains vulnerable due to heavy reliance on digital infrastructure and social media.

      The global power dynamics in the cybersecurity landscape are shifting, with countries like the UAE and Saudi Arabia becoming major buyers of 0-day exploits, surpassing the US. These countries are primarily using these exploits for surveillance and spyware on their own people, particularly dissidents, journalists, and human rights activists. The cost of an F-35 jet could buy 2,000 of these exploits per day for a year, highlighting the significant asymmetry in this digital age. The US, with its heavy reliance on digital infrastructure and social media, is vulnerable at both the infrastructure and cultural levels. The ongoing crisis in Ukraine serves as a potential limit to cyberattacks and cyber war, and the level of collaboration between the federal government, allies, and the private sector in the cybersecurity industry is a glimmer of optimism. However, the issue of cybersecurity poverty line, where many critical infrastructure providers lack the resources to protect themselves, remains a significant concern.

    • Effective cybersecurity policies with strict regulations and penalties protect countries from cyber attacksScandinavian countries with comprehensive cybersecurity policies have lower rates of successful cyber attacks, while lack of regulations leaves many countries vulnerable. Governments must prioritize cybersecurity policy development and enforcement to protect critical infrastructure and national security.

      Effective national cybersecurity policies with strict regulations and penalties are crucial for protecting countries from cyber attacks. According to a 2016 study, Scandinavian countries, such as Finland, Sweden, Norway, and Denmark, have lower rates of successful cyber attacks due to their comprehensive cybersecurity policies and regulations. These policies include fines for companies that do not meet cybersecurity standards, such as using multifactor authentication and up-to-date software. However, the lack of such regulations in many countries leaves them vulnerable to cyber attacks, especially in times of geopolitical tension. The anonymity of cyber attacks also makes it difficult to attribute them to specific entities, increasing the potential for chaos and conflict. Therefore, it is essential for governments to prioritize the development and enforcement of comprehensive cybersecurity policies to protect their critical infrastructure and national security.

    • Russia's Cyber Attacks: Testing the BoundariesRussia is experimenting with cyber attacks on critical infrastructure, testing the limits of attribution and potential consequences.

      The cybersecurity landscape is becoming increasingly complex and unstable, with decentralized actors posing a significant threat. The potential for escalation and misattribution of cyber attacks is high, and nation-states like Russia are experimenting with attribution to test the boundaries of what they can get away with. The consequences of these attacks could be severe, from political instability to infrastructure damage. Attribution is a major challenge, and public trust in official attributions is waning. The potential for cyber attacks on critical infrastructure, including those related to climate change, is also a growing concern. Russia, in particular, is suspected of engaging in these activities to test the waters and expand its capabilities without being immediately identified as the source. The cyber world is entering a new era of mutually assured digital destruction, and it's crucial that we remain vigilant and cautious in our assumptions and responses.

    • Living in a World of Mutually Assured Digital DestructionCyber attacks are becoming more common and decentralized, creating a 'mutually assured digital destruction' scenario where no one wants to launch an attack for fear of retaliation. Investigative journalist Nicole Perlroth discusses the ground zero problem of our times on the podcast 'Your Undivided Attention'.

      We are living in a world where cyber attacks and digital destruction have become increasingly common and decentralized, making attribution and prevention more challenging than ever. Nation states are not the only actors capable of launching cyber attacks; individuals with access to expensive 0-day exploits can also wreak havoc as if they were nation states. This creates a "mutually assured digital destruction" scenario, where no one wants to pull the trigger for fear of retaliation. Nicole Perlroth, a cybersecurity expert and author, discussed this issue on the podcast "Your Undivided Attention," emphasizing the need to address this ground zero problem of our times. Perlroth has spent a decade investigating cyber attacks, from Russian hacks of nuclear plants to North Korea's attack against Sony Pictures. She currently serves on the Department of Homeland Security's Cybersecurity Advisory Committee and is a guest lecturer at Stanford Graduate School of Business. The podcast is produced by the Center For Humane Technology, a non-profit organization working to catalyze a humane future.

    Recent Episodes from Your Undivided Attention

    Why Are Migrants Becoming AI Test Subjects? With Petra Molnar

    Why Are Migrants Becoming AI Test Subjects? With Petra Molnar

    Climate change, political instability, hunger. These are just some of the forces behind an unprecedented refugee crisis that’s expected to include over a billion people by 2050. In response to this growing crisis, wealthy governments like the US and the EU are employing novel AI and surveillance technologies to slow the influx of migrants at their borders. But will this rollout stop at the border?

    In this episode, Tristan and Aza sit down with Petra Molnar to discuss how borders have become a proving ground for the sharpest edges of technology, and especially AI. Petra is an immigration lawyer and co-creator of the Migration and Technology Monitor. Her new book is “The Walls Have Eyes: Surviving Migration in the Age of Artificial Intelligence.”

    RECOMMENDED MEDIA

    The Walls Have Eyes: Surviving Migration in the Age of Artificial Intelligence

    Petra’s newly published book on the rollout of high risk tech at the border.

    Bots at the Gate

    A report co-authored by Petra about Canada’s use of AI technology in their immigration process.

    Technological Testing Grounds

    A report authored by Petra about the use of experimental technology in EU border enforcement.

    Startup Pitched Tasing Migrants from Drones, Video Reveals

    An article from The Intercept, containing the demo for Brinc’s taser drone pilot program.

    The UNHCR

    Information about the global refugee crisis from the UN.

    RECOMMENDED YUA EPISODES

    War is a Laboratory for AI with Paul Scharre

    No One is Immune to AI Harms with Dr. Joy Buolamwini

    Can We Govern AI? With Marietje Schaake

    CLARIFICATION:

    The iBorderCtrl project referenced in this episode was a pilot project that was discontinued in 2019

    Former OpenAI Engineer William Saunders on Silence, Safety, and the Right to Warn

    Former OpenAI Engineer William Saunders on Silence, Safety, and the Right to Warn

    This week, a group of current and former employees from Open AI and Google Deepmind penned an open letter accusing the industry’s leading companies of prioritizing profits over safety. This comes after a spate of high profile departures from OpenAI, including co-founder Ilya Sutskever and senior researcher Jan Leike, as well as reports that OpenAI has gone to great lengths to silence would-be whistleblowers. 

    The writers of the open letter argue that researchers have a “right to warn” the public about AI risks and laid out a series of principles that would protect that right. In this episode, we sit down with one of those writers: William Saunders, who left his job as a research engineer at OpenAI in February. William is now breaking the silence on what he saw at OpenAI that compelled him to leave the company and to put his name to this letter. 

    RECOMMENDED MEDIA 

    The Right to Warn Open Letter 

    My Perspective On "A Right to Warn about Advanced Artificial Intelligence": A follow-up from William about the letter

     Leaked OpenAI documents reveal aggressive tactics toward former employees: An investigation by Vox into OpenAI’s policy of non-disparagement.

    RECOMMENDED YUA EPISODES

    1. A First Step Toward AI Regulation with Tom Wheeler 
    2. Spotlight on AI: What Would It Take For This to Go Well? 
    3. Big Food, Big Tech and Big AI with Michael Moss 
    4. Can We Govern AI? with Marietje Schaake

    Your Undivided Attention is produced by the Center for Humane Technology. Follow us on Twitter: @HumaneTech_

    War is a Laboratory for AI with Paul Scharre

    War is a Laboratory for AI with Paul Scharre

    Right now, militaries around the globe are investing heavily in the use of AI weapons and drones.  From Ukraine to Gaza, weapons systems with increasing levels of autonomy are being used to kill people and destroy infrastructure and the development of fully autonomous weapons shows little signs of slowing down. What does this mean for the future of warfare? What safeguards can we put up around these systems? And is this runaway trend toward autonomous warfare inevitable or will nations come together and choose a different path? In this episode, Tristan and Daniel sit down with Paul Scharre to try to answer some of these questions. Paul is a former Army Ranger, the author of two books on autonomous weapons and he helped the Department of Defense write a lot of its policy on the use of AI in weaponry. 

    RECOMMENDED MEDIA

    Four Battlegrounds: Power in the Age of Artificial Intelligence: Paul’s book on the future of AI in war, which came out in 2023.

    Army of None: Autonomous Weapons and the Future of War: Paul’s 2018 book documenting and predicting the rise of autonomous and semi-autonomous weapons as part of modern warfare.

    The Perilous Coming Age of AI Warfare: How to Limit the Threat of Autonomous Warfare: Paul’s article in Foreign Affairs based on his recent trip to the battlefield in Ukraine.

    The night the world almost almost ended: A BBC documentary about Stanislav Petrov’s decision not to start nuclear war.

    AlphaDogfight Trials Final Event: The full simulated dogfight between an AI and human pilot. The AI pilot swept, 5-0.

    RECOMMENDED YUA EPISODES

    1. The AI ‘Race’: China vs. the US with Jeffrey Ding and Karen Hao
    2. Can We Govern AI? with Marietje Schaake
    3. Big Food, Big Tech and Big AI with Michael Moss
    4. The Invisible Cyber-War with Nicole Perlroth

    Your Undivided Attention is produced by the Center for Humane Technology. Follow us on Twitter: @HumaneTech_

    AI and Jobs: How to Make AI Work With Us, Not Against Us With Daron Acemoglu

    AI and Jobs: How to Make AI Work With Us, Not Against Us With Daron Acemoglu

    Tech companies say that AI will lead to massive economic productivity gains. But as we know from the first digital revolution, that’s not what happened. Can we do better this time around?

    RECOMMENDED MEDIA

    Power and Progress by Daron Acemoglu and Simon Johnson Professor Acemoglu co-authored a bold reinterpretation of economics and history that will fundamentally change how you see the world

    Can we Have Pro-Worker AI? Professor Acemoglu co-authored this paper about redirecting AI development onto the human-complementary path

    Rethinking Capitalism: In Conversation with Daron Acemoglu The Wheeler Institute for Business and Development hosted Professor Acemoglu to examine how technology affects the distribution and growth of resources while being shaped by economic and social incentives

    RECOMMENDED YUA EPISODES

    1. The Three Rules of Humane Tech
    2. The Tech We Need for 21st Century Democracy
    3. Can We Govern AI?
    4. An Alternative to Silicon Valley Unicorns

    Your Undivided Attention is produced by the Center for Humane Technology. Follow us on Twitter: @HumaneTech_

    Jonathan Haidt On How to Solve the Teen Mental Health Crisis

    Jonathan Haidt On How to Solve the Teen Mental Health Crisis

    Suicides. Self harm. Depression and anxiety. The toll of a social media-addicted, phone-based childhood has never been more stark. It can be easy for teens, parents and schools to feel like they’re trapped by it all. But in this conversation with Tristan Harris, author and social psychologist Jonathan Haidt makes the case that the conditions that led to today’s teenage mental health crisis can be turned around – with specific, achievable actions we all can take starting today.

    This episode was recorded live at the San Francisco Commonwealth Club.  

    Correction: Tristan mentions that 40 Attorneys General have filed a lawsuit against Meta for allegedly fostering addiction among children and teens through their products. However, the actual number is 42 Attorneys General who are taking legal action against Meta.

    Clarification: Jonathan refers to the Wait Until 8th pledge. By signing the pledge, a parent  promises not to give their child a smartphone until at least the end of 8th grade. The pledge becomes active once at least ten other families from their child’s grade pledge the same.

    Chips Are the Future of AI. They’re Also Incredibly Vulnerable. With Chris Miller

    Chips Are the Future of AI. They’re Also Incredibly Vulnerable. With Chris Miller

    Beneath the race to train and release more powerful AI models lies another race: a race by companies and nation-states to secure the hardware to make sure they win AI supremacy. 

    Correction: The latest available Nvidia chip is the Hopper H100 GPU, which has 80 billion transistors. Since the first commercially available chip had four transistors, the Hopper actually has 20 billion times that number. Nvidia recently announced the Blackwell, which boasts 208 billion transistors - but it won’t ship until later this year.

    RECOMMENDED MEDIA 

    Chip War: The Fight For the World’s Most Critical Technology by Chris Miller

    To make sense of the current state of politics, economics, and technology, we must first understand the vital role played by chips

    Gordon Moore Biography & Facts

    Gordon Moore, the Intel co-founder behind Moore's Law, passed away in March of 2023

    AI’s most popular chipmaker Nvidia is trying to use AI to design chips faster

    Nvidia's GPUs are in high demand - and the company is using AI to accelerate chip production

    RECOMMENDED YUA EPISODES

    Future-proofing Democracy In the Age of AI with Audrey Tang

    How Will AI Affect the 2024 Elections? with Renee DiResta and Carl Miller

    The AI ‘Race’: China vs. the US with Jeffrey Ding and Karen Hao

    Protecting Our Freedom of Thought with Nita Farahany

    Your Undivided Attention is produced by the Center for Humane Technology. Follow us on Twitter: @HumaneTech_

     

     

    Future-proofing Democracy In the Age of AI with Audrey Tang

    Future-proofing Democracy In the Age of AI with Audrey Tang

    What does a functioning democracy look like in the age of artificial intelligence? Could AI even be used to help a democracy flourish? Just in time for election season, Taiwan’s Minister of Digital Affairs Audrey Tang returns to the podcast to discuss healthy information ecosystems, resilience to cyberattacks, how to “prebunk” deepfakes, and more. 

    RECOMMENDED MEDIA 

    Testing Theories of American Politics: Elites, Interest Groups, and Average Citizens by Martin Gilens and Benjamin I. Page

    This academic paper addresses tough questions for Americans: Who governs? Who really rules? 

    Recursive Public

    Recursive Public is an experiment in identifying areas of consensus and disagreement among the international AI community, policymakers, and the general public on key questions of governance

    A Strong Democracy is a Digital Democracy

    Audrey Tang’s 2019 op-ed for The New York Times

    The Frontiers of Digital Democracy

    Nathan Gardels interviews Audrey Tang in Noema

    RECOMMENDED YUA EPISODES 

    Digital Democracy is Within Reach with Audrey Tang

    The Tech We Need for 21st Century Democracy with Divya Siddarth

    How Will AI Affect the 2024 Elections? with Renee DiResta and Carl Miller

    The AI Dilemma

    Your Undivided Attention is produced by the Center for Humane Technology. Follow us on Twitter: @HumaneTech_

    U.S. Senators Grilled Social Media CEOs. Will Anything Change?

    U.S. Senators Grilled Social Media CEOs. Will Anything Change?

    Was it political progress, or just political theater? The recent Senate hearing with social media CEOs led to astonishing moments — including Mark Zuckerberg’s public apology to families who lost children following social media abuse. Our panel of experts, including Facebook whistleblower Frances Haugen, untangles the explosive hearing, and offers a look ahead, as well. How will this hearing impact protocol within these social media companies? How will it impact legislation? In short: will anything change?

    Clarification: Julie says that shortly after the hearing, Meta’s stock price had the biggest increase of any company in the stock market’s history. It was the biggest one-day gain by any company in Wall Street history.

    Correction: Frances says it takes Snap three or four minutes to take down exploitative content. In Snap's most recent transparency report, they list six minutes as the median turnaround time to remove exploitative content.

    RECOMMENDED MEDIA 

    Get Media Savvy

    Founded by Julie Scelfo, Get Media Savvy is a non-profit initiative working to establish a healthy media environment for kids and families

    The Power of One by Frances Haugen

    The inside story of France’s quest to bring transparency and accountability to Big Tech

    RECOMMENDED YUA EPISODES

    Real Social Media Solutions, Now with Frances Haugen

    A Conversation with Facebook Whistleblower Frances Haugen

    Are the Kids Alright?

    Social Media Victims Lawyer Up with Laura Marquez-Garrett

    Your Undivided Attention is produced by the Center for Humane Technology. Follow us on Twitter: @HumaneTech_

     

     

    Taylor Swift is Not Alone: The Deepfake Nightmare Sweeping the Internet

    Taylor Swift is Not Alone: The Deepfake Nightmare Sweeping the Internet

    Over the past year, a tsunami of apps that digitally strip the clothes off real people has hit the market. Now anyone can create fake non-consensual sexual images in just a few clicks. With cases proliferating in high schools, guest presenter Laurie Segall talks to legal scholar Mary Anne Franks about the AI-enabled rise in deep fake porn and what we can do about it. 

    Correction: Laurie refers to the app 'Clothes Off.' It’s actually named Clothoff. There are many clothes remover apps in this category.

    RECOMMENDED MEDIA 

    Revenge Porn: The Cyberwar Against Women

    In a five-part digital series, Laurie Segall uncovers a disturbing internet trend: the rise of revenge porn

    The Cult of the Constitution

    In this provocative book, Mary Anne Franks examines the thin line between constitutional fidelity and constitutional fundamentalism

    Fake Explicit Taylor Swift Images Swamp Social Media

    Calls to protect women and crack down on the platforms and technology that spread such images have been reignited

    RECOMMENDED YUA EPISODES 

    No One is Immune to AI Harms

    Esther Perel on Artificial Intimacy

    Social Media Victims Lawyer Up

    The AI Dilemma

    Your Undivided Attention is produced by the Center for Humane Technology. Follow us on Twitter: @HumaneTech_

    Can Myth Teach Us Anything About the Race to Build Artificial General Intelligence? With Josh Schrei

    Can Myth Teach Us Anything About the Race to Build Artificial General Intelligence? With Josh Schrei

    We usually talk about tech in terms of economics or policy, but the casual language tech leaders often use to describe AI — summoning an inanimate force with the powers of code — sounds more... magical. So, what can myth and magic teach us about the AI race? Josh Schrei, mythologist and host of The Emerald podcast,  says that foundational cultural tales like "The Sorcerer's Apprentice" or Prometheus teach us the importance of initiation, responsibility, human knowledge, and care.  He argues these stories and myths can guide ethical tech development by reminding us what it is to be human. 

    Correction: Josh says the first telling of "The Sorcerer’s Apprentice" myth dates back to ancient Egypt, but it actually dates back to ancient Greece.

    RECOMMENDED MEDIA 

    The Emerald podcast

    The Emerald explores the human experience through a vibrant lens of myth, story, and imagination

    Embodied Ethics in The Age of AI

    A five-part course with The Emerald podcast’s Josh Schrei and School of Wise Innovation’s Andrew Dunn

    Nature Nurture: Children Can Become Stewards of Our Delicate Planet

    A U.S. Department of the Interior study found that the average American kid can identify hundreds of corporate logos but not plants and animals

    The New Fire

    AI is revolutionizing the world - here's how democracies can come out on top. This upcoming book was authored by an architect of President Biden's AI executive order

    RECOMMENDED YUA EPISODES 

    How Will AI Affect the 2024 Elections?

    The AI Dilemma

    The Three Rules of Humane Tech

    AI Myths and Misconceptions

     

    Your Undivided Attention is produced by the Center for Humane Technology. Follow us on Twitter: @HumaneTech_

    Related Episodes

    Joey Bites The Sprout

    Joey Bites The Sprout
    Ben Stein and co-host Judah Friedman are joined by Myles Wakeham from beunconstrained.com and Americas Lawyer Larry Klayman from Freedomwatchusa.org to discuss, the fractured state of our nation and the world. Every time this regime speaks they cause more problems. Plus is there any point in watching the Supreme Court nomination when we know the result? Plus whole lot more.

    Putin Has Cured, Covid, Crime, Well What hasn't He Cured?

    Putin Has Cured, Covid, Crime, Well What hasn't He Cured?
    Ben Stein and co-host Judah Friedman are joined by Gary Collins of TheSimpleLifeNow.com to discuss, how isn't it convenient how the news cycle so quickly changed. We are facing wars foreign and domestic and this regime has zero capabilities in resolving any of it. Intentional you decide. We have zero negotiating options and people with zero negotiating skills.

    They Call Me Uncle Ben

    They Call Me Uncle Ben
    The February 23 edition of The World According to Ben Stein starts with a trip to the breakfast bar, with Ben Stein, Judah Friedman, and Peter reviewing the inanity inherent in the complaints the grievance lobby has lodged against @BenStein for his wistful comments concerning a hearty Aunt Jemima meal. Then it’s off to Hollywood where we talk about movies, why no one eats out anymore at restaurants, and why Peter needs to write a screenplay. Finally, a brief discussion about Biden’s Israel policy and how so much of what is wrong today in the region should be laid at the feet of former President Jimmy Carter. That and viewer mail, upcoming on The World According to Ben Stein.